cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2012-1537,https://securityvulnerability.io/vulnerability/CVE-2012-1537,,"Heap-based buffer overflow in DirectPlay in DirectX 9.0 through 11.1 in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows remote attackers to execute arbitrary code via a crafted Office document, aka ""DirectPlay Heap Overflow Vulnerability.""",Microsoft,Directx,,,0.9458699822425842,false,false,false,false,,false,false,2012-12-12T00:00:00.000Z,0 CVE-2010-1880,https://securityvulnerability.io/vulnerability/CVE-2010-1880,,"Unspecified vulnerability in Quartz.dll for DirectShow on Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista SP1, and Server 2008 allows remote attackers to execute arbitrary code via a media file with crafted compression data, aka ""MJPEG Media Decompression Vulnerability.""",Microsoft,Directx,,,0.7239300012588501,false,false,false,false,,false,false,2010-06-08T22:00:00.000Z,0 CVE-2010-1879,https://securityvulnerability.io/vulnerability/CVE-2010-1879,,"Unspecified vulnerability in Quartz.dll for DirectShow; Windows Media Format Runtime 9, 9.5, and 11; Media Encoder 9; and the Asycfilt.dll COM component allows remote attackers to execute arbitrary code via a media file with crafted compression data, aka ""Media Decompression Vulnerability.""",Microsoft,Directx,,,0.807420015335083,false,false,false,false,,false,false,2010-06-08T22:00:00.000Z,0 CVE-2009-1538,https://securityvulnerability.io/vulnerability/CVE-2009-1538,,"The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 performs updates to pointers without properly validating unspecified data values, which allows remote attackers to execute arbitrary code via a crafted QuickTime media file, aka ""DirectX Pointer Validation Vulnerability.""",Microsoft,"Directx,Windows 2000",,,0.7576500177383423,false,false,false,false,,false,false,2009-07-15T15:00:00.000Z,0 CVE-2009-1539,https://securityvulnerability.io/vulnerability/CVE-2009-1539,,"The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 does not properly validate unspecified size fields in QuickTime media files, which allows remote attackers to execute arbitrary code via a crafted file, aka ""DirectX Size Validation Vulnerability.""",Microsoft,"Directx,Windows 2000",,,0.6821399927139282,false,false,false,false,,false,false,2009-07-15T15:00:00.000Z,0 CVE-2009-1537,https://securityvulnerability.io/vulnerability/CVE-2009-1537,,"Unspecified vulnerability in the QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted QuickTime media file, as exploited in the wild in May 2009, aka ""DirectX NULL Byte Overwrite Vulnerability.""",Microsoft,"Directx,Windows 2000",,,0.8724899888038635,false,false,false,false,,false,false,2009-05-29T18:00:00.000Z,0 CVE-2009-0084,https://securityvulnerability.io/vulnerability/CVE-2009-0084,,"Use-after-free vulnerability in DirectShow in Microsoft DirectX 8.1 and 9.0 allows remote attackers to execute arbitrary code via an MJPEG file or video stream with a malformed Huffman table, which triggers an exception that frees heap memory that is later accessed, aka ""MJPEG Decompression Vulnerability.""",Microsoft,Directx,,,0.6178900003433228,false,false,false,false,,false,false,2009-04-15T03:49:00.000Z,0 CVE-2008-0011,https://securityvulnerability.io/vulnerability/CVE-2008-0011,,"Microsoft DirectX 8.1 through 9.0c, and DirectX on Microsoft XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, does not properly perform MJPEG error checking, which allows remote attackers to execute arbitrary code via a crafted MJPEG stream in a (1) AVI or (2) ASF file, aka the ""MJPEG Decoder Vulnerability.""",Microsoft,Directx,,,0.7572900056838989,false,false,false,false,,false,false,2008-06-12T01:30:00.000Z,0 CVE-2008-1444,https://securityvulnerability.io/vulnerability/CVE-2008-1444,,"Stack-based buffer overflow in Microsoft DirectX 7.0 and 8.1 on Windows 2000 SP4 allows remote attackers to execute arbitrary code via a Synchronized Accessible Media Interchange (SAMI) file with crafted parameters for a Class Name variable, aka the ""SAMI Format Parsing Vulnerability.""",Microsoft,Directx,,,0.9426900148391724,false,false,false,false,,false,false,2008-06-12T01:30:00.000Z,0 CVE-2007-3895,https://securityvulnerability.io/vulnerability/CVE-2007-3895,,Buffer overflow in Microsoft DirectShow in Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted (1) WAV or (2) AVI file.,Microsoft,Directx,,,0.8238199949264526,false,false,false,false,,false,false,2007-12-12T00:00:00.000Z,0 CVE-2007-3901,https://securityvulnerability.io/vulnerability/CVE-2007-3901,,Stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll for Microsoft DirectX 7.0 through 10.0 allows remote attackers to execute arbitrary code via a crafted SAMI file.,Microsoft,Directx,,,0.958329975605011,false,false,false,false,,false,false,2007-12-12T00:00:00.000Z,0 CVE-2007-4336,https://securityvulnerability.io/vulnerability/CVE-2007-4336,,"Buffer overflow in the Live Picture Corporation DXSurface.LivePicture.FlashPix.1 (DirectTransform FlashPix) ActiveX control in DXTLIPI.DLL 6.0.2.827, as packaged in Microsoft DirectX Media 6.0 SDK, allows remote attackers to execute arbitrary code via a long SourceUrl property value.",Microsoft,Directx Media,,,0.9656500220298767,false,false,false,false,,false,false,2007-08-14T18:00:00.000Z,0 CVE-2006-4183,https://securityvulnerability.io/vulnerability/CVE-2006-4183,,"Heap-based buffer overflow in Microsoft DirectX SDK (February 2006) and probably earlier, including 9.0c End User Runtimes, allows context-dependent attackers to execute arbitrary code via a crafted Targa file with a run-length-encoding (RLE) compression that produces more data than expected when decoding.",Microsoft,Directx Sdk,,,0.8141000270843506,false,false,false,false,,false,false,2007-07-18T23:30:00.000Z,0 CVE-2004-0202,https://securityvulnerability.io/vulnerability/CVE-2004-0202,,"IDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet.",Microsoft,Directx,,,0.6554200053215027,false,false,false,false,,false,false,2004-08-06T04:00:00.000Z,0 CVE-2003-0346,https://securityvulnerability.io/vulnerability/CVE-2003-0346,,"Multiple integer overflows in a Microsoft Windows DirectX MIDI library (QUARTZ.DLL) allow remote attackers to execute arbitrary code via a MIDI (.mid) file with (1) large length for a Text or Copyright string, or (2) a large number of tracks, which leads to a heap-based buffer overflow.",Microsoft,Directx,,,0.3449299931526184,false,false,false,false,,false,false,2003-08-27T04:00:00.000Z,0 CVE-2002-0975,https://securityvulnerability.io/vulnerability/CVE-2002-0975,,Buffer overflow in Microsoft DirectX Files Viewer ActiveX control (xweb.ocx) 2.0.6.15 and earlier allows remote attackers to execute arbitrary via a long File parameter.,Microsoft,Directx Files Viewer Control,,,0.01498000044375658,false,false,false,false,,false,false,2002-09-24T04:00:00.000Z,0